Coast Guard Academy Creates New Cybersystems Program

The US Coast Guard Academy is now offering an academic program in cyber systems, its first new major  initiative in a quarter century.

The program beginning this fall reflects the maritime service's evolution toward conducting operations in cyberspace as it does at sea and by air, said Capt. Lee Petty, chief of the Coast Guard's Office of Cyberspace Forces in Washington.

"This is a new domain and we're approaching it in a similar vein as we do in these physical domains," Petty said.

The academy in New London is opening a cyber lab with dedicated servers, a new laboratory and a specially designed classroom to support the program. Kurt Colella, the academy's dean of academics, said the program will incorporate elements of fields including policy, law, ethics, operating systems, software design and intelligence.

Cadets attend the academy tuition-free and graduate as Coast Guard officers with a bachelor of science degree and a requirement to spend five years in the service. Nearly 300 students enroll annually.

The new academic program is the first since the addition of mechanical engineering as a major in 1993.

Last year was the first time that new graduates from the academy were assigned to the Coast Guard's cyber command. Some graduates who major in cyber systems will report to the same command, while others will report to the fleet, Petty said.

The academy also has a cyber team that participates in competitions among service academies organized by the National Security Agency. It operates as a club sports team.

A Coast Guard Cyber Strategy issued in 2015 identified strategic priorities of defending cyberspace by protecting the service's information technology networks, enabling operations by applying cyber knowledge to its traditional missions and protecting infrastructure that's critical to maritime transportation systems.

KVEO.com:

You Might Also Read:

Cybersecurity At Sea:

Maritime Cybersecurity: No Substitute for Testing:

 

« Breakthrough Technologies To Combat Insider Threats
Russia Will Keep Up Cyber Attacks For Geo-Political Influence »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Conscio Technologies

Conscio Technologies

Conscio Technologies is a specialist in IT security awareness. Our solutions allow you to easily manage innovative online IT awareness campaigns.

Cloud Credential Council (CCC)

Cloud Credential Council (CCC)

The CCC is a leading provider of vendor-neutral certification programs that empower IT and business professionals in their digital transformation journey.

NetMotion Software

NetMotion Software

NetMotion Software specializes in mobile performance management solutions to manage, secure and support the mobile enterprise.

AuthenTrend

AuthenTrend

AuthenTrend provide biometric authentication products to achieve high security with extreme ease-of-use for the user.

Open Systems International (OSI)

Open Systems International (OSI)

Our innovative Operations Technology (OT) solutions are highly scalable and can be deployed by various utility companies to monitor, control and optimize their real-time operations.

Subex

Subex

Subex leverages its award-winning telecom analytics solutions in areas such as Revenue Assurance, Fraud Management, Asset Assurance and Partner Management, and IoT Security.

Arcanum Information Security (AIS)

Arcanum Information Security (AIS)

Arcanum Information Security is a specialist Information Assurance Consultancy and a leading provider of Cyber Security services to UK Defence, UK Government, Enterprise businesses and SMEs.

Toothpic

Toothpic

ToothPic has invented, designed, developed and patented a solution to enable companies to turn every smartphone into a secure key for a user-friendly online authentication.

Seigur

Seigur

Seigur is an IT consultancy business providing flexible legal and cyber security services for IT and data privacy programmes.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

Snare

Snare

Snare is a comprehensive set of event monitoring and analysis tools designed to address critical auditing and security requirements.

Parablu

Parablu

Parablu is a leading provider of data security and resiliency solutions for the digital enterprise.

Prikus Tech

Prikus Tech

Prikus is a full-fledged Cyber Security Company helping organizations worldwide to manage cyber risks. We offer Risk & Compliance Services, Security Testing & Managed Security Services.

Pixee

Pixee

Pixee fixes vulnerabilities, hardens code, squashes bugs, and gives engineers more time to focus on the work that counts.

Internet Initiative Japan (IIJ)

Internet Initiative Japan (IIJ)

IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers.

Edera

Edera

Edera is changing the way containers are run and secured, making isolation a reality and fundamentally transforming computing in the process.